Indian police uncovered a plot, but Sri Lanka didn’t act

Agencies
April 28, 2019

Colombo, Apr 28: While monitoring the usual channels, Indian police stumbled upon something extraordinary: a detailed plot for what would become the bloodiest attack linked to the Daesh group in South Asia.

Police were investigating suspected sympathizers of the withered caliphate in southern India when a name they had no record of surfaced — National Towheed Jamaat, the Sri Lankan Daesh-backed militant organization that authorities say conducted the coordinated Easter Sunday attacks on churches and hotels in Sri Lanka that killed more than 250 people.

Indian police managed to break into the group’s communications and began tapping into the plot, according to Ajai Sahni, executive director of the Institute for Conflict Management in New Delhi.

“That is why the kind of detailing of the incident they received was very, very specific,” Sahni said. “They knew the group, they knew the targets, they knew the time, they knew the whereabouts of the suicide bombers, and all of this was communicated to the Sri Lankan government.”

Top Sri Lankan officials have acknowledged that some of the island nation’s intelligence units were given advance notice about the attacks — starting weeks ago and up until the morning of the bombings — but that little was done to prevent them.

Both President Maithripala Sirisena, who is also Sri Lanka’s minister of defense and in charge of national police, and Prime Minister Ranil Wickremesinghe, who has been kept out of high-level security meetings since Sirisena tried to oust him last fall, said they only learned about the plot after it had been carried out.

“The fact is, it’s very, very specific information and that has been conveyed to everyone in writing. That is the action that was missing in some cases. That’s what we’re investigating,” Wickremesinghe said.

The first intelligence brief from India arrived April 4, more than two weeks before the bombings. It said a suicide terrorist attack was planned against “some important churches” and listed six people likely to be involved.

The deputy inspector of police shared the report with at least four security unit directors, including those responsible for “VIPs” and foreign embassies, along with a memo, urging the directors to pay extra attention to the places and people in their care.

India’s final intelligence warning came just before the Easter morning blasts, Sahni said.

Why the warnings went unheeded is the subject of intense public debate, with some blaming the dismantling of a system built by former strongman President Mahinda Rajapaksa for rapid response to rebel activity during Sri Lanka’s long civil war.

For 26 years, the Tamil Tigers militants from Sri Lanka’s minority Tamil ethnic community fought for independence from the Buddhist, ethnically Sinhalese-majority state. Military forces under Rajapaksa’s brother, then-Secretary of Defense Gotabhaya Rajapaksa, brutally crushed them in 2009.

The current state minister of defense, Ruwan Wijewardene, said “weakness” within Sri Lanka’s security apparatus led to the failure to prevent the Easter bombings.

Sirisena, while campaigning for the 2015 election to defeat Rajapaksa, had stressed the need for fresh investigations of military officials, including intelligence officers accused of abducting and killing civilians, political opponents and journalists during the civil war.

Since then, some military officials have been arrested on charges related to their actions during the war and remanded in detention facilities. Court cases are ongoing.

But on Friday, Sirisena, perhaps with an eye toward the 2020 election, said that arresting military intelligence officials after the civil war had weakened national security. He promised a shake-up, asking for the resignations of both his secretary of defense and inspector general of police.

Some experts believe Sri Lankan security forces may not have given much credence to Indian intelligence because of its controversial role in the civil war.

India’s Research and Analysis Wing, or RAW, the country’s external intelligence group, initially supported Tamil separatists, training and arming the Liberation Tigers of Tamil Eelman in the 1970s. But after the group’s terrorist activities in the 1980s, RAW withdrew its support.

New Delhi made a pact with Colombo in 1987 to send peacekeeping forces to the island on its southern tip, and they ended up fighting the rebels. They were asked to withdraw a few years later amid allegations of abuses against Tamils. In 1991, Indian Prime Minister Rajiv Gandhi was assassinated by a Tamil Tiger suicide bomber.

India questioned Sri Lanka’s heavy-handed approach to defeating the Tigers in the final months of the war, when tens of thousands of civilians were reportedly killed by government troops. Thousands more are still missing. Ethnic minority Tamils in the country’s north and east are still reeling from the effects of the war.

Indian security and intelligence agencies lost some of their “moral authority” with the Sri Lankans, said M.K. Narayanan, the former head of India’s external intelligence service.

“What really happened was India lost moral authority. India did not accept the policies that were being followed, so they lost a lot of support in Sri Lanka,” he said.

Genealogical and cultural ties between Sri Lanka and India date back thousands of years. According to folklore, the island’s majority Sinhalese are descendants of an Indian prince banished there 2,000 years ago.

The nation’s minority Tamils, meanwhile, are in part the descendants of more than a million tea and rubber plantation workers brought to Sri Lanka from southern India by British colonial rulers in the 18th and 19th centuries.

And India shares intelligence with its neighbors in part to keep them within its sphere of influence, Narayanan said.

Located just 23 kilometers (14 miles) off its southeast coast, India sees Sri Lanka as a bulwark in its military defenses to ward off potential Chinese incursions. Soon after the Easter attacks, India deployed naval and coast guard ships along the narrow Palk Strait.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
January 13,2020

New Delhi, Jan 13: The Delhi High Court on Monday sought response of the city police, Delhi government, WhatsApp Inc, Google Inc and Apple Inc on a plea of three JNU professors to preserve data, CCTV footage and other evidence relating to the January 5 violence on the varsity campus.

The Delhi Police informed the court that it has asked the JNU administration to preserve and hand over CCTV footage of the violence.

Justice Brijesh Sethi listed the matter for further hearing on Tuesday.

The court was told by Delhi government Standing Counsel (criminal) Rahul Mehra that the police has not yet received any response from the university administration.

The counsel said police has also written to WhatsApp to preserve data of two groups "Unity Against Left" and "Friends of RSS" including messages, pictures and videos and phone numbers of members, related to JNU violence incident.

The petition was filed by JNU professors Ameet Parameswaran, Atul Sood and Shukla Vinayak Sawant seeking necessary directions to the Delhi Police Commissioner and Delhi government.

The petition also sought direction to the Delhi Police to retrieve all CCTV footage of JNU campus.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
July 18,2020

Days after Twitter accounts of several billionaires were hacked to engineer a crypto scam, Twitter on Saturday said it is embarrassed, disappointed and, more than anything, sorry for what happened with some of its high-profile users as attackers successfully manipulated its employees and used their credentials to access internal systems, including getting through the two-factor protections.

In the first detailed summary of the "social engineering attack" via a crypto scam that hit at least 130 users this week, Twitter said for 45 of those accounts, the attackers were able to initiate a password reset, login to the account and send Tweets.

"We are continuing our forensic review of all of the accounts to confirm all actions that may have been taken. In addition, we believe they may have attempted to sell some of the usernames," the micro-blogging platform said in a statement.

For up to eight of the Twitter accounts involved, the attackers took the additional step of downloading the account's information via "Your Twitter Data" tool.

This is a tool that is meant to provide an account owner with a summary of their Twitter account details and activity.

"We are reaching out directly to any account owner where we know this to be true. None of the eight were verified accounts," said Twitter.

The company said the attackers were not able to view previous account passwords, as those are not stored in plain text or available through the tools used in the attack.

"Attackers were able to view personal information including email addresses and phone numbers, which are displayed to some users of our internal support tools," informed Twitter.

In cases where an account was taken over by the attacker, they may have been able to view additional information, Twitter added, saying its forensic investigation of these activities was still ongoing.

"We are actively working on communicating directly with the account-holders that were impacted".

The company said it will soon restore access for all account owners who may still be locked out as a result of the remediation efforts.

The New York Times reported on Friday that the Twitter crypto scam can be traced back to a group of hackers who congregate online at OGusers.com, a username-swapping community where people buy and sell coveted online handles.

The report said that the Twitter hack is not from Russian, Chinese or North Korean hackers but was done by a group of young people, "one of whom says he lives at home with his mother".

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
April 27,2020

Riyadh, Apr 27: The government of Saudi Arabia has signed a SR995 million (approx. Dh972m) contract with China to provide Covid-19 tests for nine million people in the Kingdom.

The Saudi Press Agency, SPA, reported that the decision came "as a result of a phone call made today (Sunday) between the Custodian of the Two Holy Mosques King Salman bin Abdulaziz Al Saud and Chinese President Xi Jinping."

The contract includes providing necessary equipment and supplies, making available of 500 Chinese specialists and technicians who are specialised in performing tests, establishing six large regional laboratories throughout the Kingdom; including a mobile laboratory with a capacity of performing 10,000 tests per day. Saudi cadres will also be trained to conduct daily tests and comprehensive field tests, under the new agreement

The contract was co-signed by the National Unified Procurement Company and Chinese company Huo-yan Laboratories by Dr. Abdullah Al Rabeeah, Advisor at the Royal Court, on behalf of the Government of Saudi Arabia, and Chinese Ambassador to the Kingdom Chen Weiqing, as a representative of the Chinese Government.

The contract is one of the largest contracts that will provide diagnostic tests for the novel Coronavirus.

Tests were also purchased from several other companies from the United States, Switzerland and South Korea, bringing the number of available tests to 14.5 million, covering around 40 percent of Saudi Arabia's population, SPA added.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.